providing a mobile device with web-based access to data objects is disclosed. Authentication information is sent from a mobile device to a relay server. The relay server executes a connection application to establish a connection to a web access server. The authentication information is provided to the web access server associated with a data store hosting a data object. Upon authentication, the data object is provided to the relay server from the data store. The data object is then provided to the mobile device.
|
1. A relay server for providing email access via a web access server, the relay server comprising:
a memory configured to host a connection application;
a processor configured to:
execute the connection application to process received authentication information to establish a connection with the web access server,
wherein the web access server is configured to provide access, by a computing device, to a data object hosted by a data store when a desktop application associated with the data object is unavailable on the computing device, and
wherein, responsive to authentication by the web access server, the connection between the relay server and the web access server provides for machine-to-machine communication between the relay server and the data store via the web access server facilitating access to the data object by a mobile device without use of the desktop application, and
wherein the data store is located within a protected network;
determine that the data object has been updated responsive to receiving the data object from the data store;
notify the mobile device that the data object has been updated; and
generate keep-alive pings to be sent to the web access server to maintain connectivity with the web access server responsive to receiving instructions from the mobile device.
2. The relay server of
3. The relay server of
4. The relay server of
5. The relay server of
6. The relay server of
7. The relay server of
8. The relay server of
|
The present application is a continuation of U.S. patent application Ser. No. 15/231,713 filed Aug. 8, 2016, which is entitled “SYSTEM AND METHOD OF A RELAY SERVER FOR MANAGING COMMUNICATIONS AND NOTIFICATION BETWEEN A MOBILE DEVICE AND APPLICATION SERVER”, being issued as U.S. Pat. No. 10,659,417 on May 19, 2020, which is a continuation of U.S. patent application Ser. No. 14/468,282 filed Aug. 25, 2014, which is entitled “SYSTEM AND METHOD OF A RELAY SERVER FOR MANAGING COMMUNICATIONS AND NOTIFICATION BETWEEN A MOBILE DEVICE AND APPLICATION SERVER”, which is a continuation of U.S. patent application Ser. No. 12/361,434 filed Jan. 28, 2009, which is entitled “WEB-BASED ACCESS TO DATA OBJECTS”, now U.S. Pat. No. 8,838,744 issued Sep. 16, 2014, which claims the priority benefit of U.S. Provisional Patent Application No. 61/062,797 filed Jan. 28, 2008, which is entitled “SYSTEMS AND METHODS FOR DATA TRANSPORT”, the disclosures of which are incorporated herein by reference.
The present invention generally relates to wireless mobile device services. More specifically, the present invention relates to providing wireless mobile device services with web-based access to data objects.
In a network, the hosts most vulnerable to attack are those that provide services to users outside of the local area network (LAN). Due to the increased potential for being compromised, these hosts may be placed into their own sub-network in order to protect the rest of the network should an intruder successfully attack and infiltrate the service providing host. The sub-network is often referred to as a demilitarized zone (DMZ). In some instances, the DMZ may also be referred to as a demarcation zone or a perimeter network.
A DMZ is a physical or logical sub-network that contains an organization's external services as proffered over a larger, un-trusted network such as the Internet. The purpose of a DMZ is to add an additional layer of security to an organizational LAN. Hosts in the DMZ are generally not able to establish communication directly with any other host in the internal network although communication with other hosts in the DMZ and to the external network is allowed. This network configuration allows hosts in the DMZ to provide services to both the internal and external network while protecting the internal network from attack and infiltration.
Services provided to users in an external network are usually hosted in the DMZ. Common services may be provided by web servers. Other servers, such as database servers or e-mail servers, are not included in the DMZ because they may contain sensitive or confidential information. For example, e-mail may be stored on an internal e-mail server. A mail server in the DMZ passes incoming e-mail to the internal e-mail server; the internal e-mail server then passes outgoing e-mail to the mail server in the DMZ.
Common e-mail applications that may utilize a configuration with a mail server in the DMZ include Microsoft Exchange and Lotus Domino. These enterprise e-mail applications allow a user to view and manage their e-mail using a computing device with the respective e-mail client software installed (e.g., Microsoft Outlook or Lotus Notes). Using an intermediate mail server that is independent from the protected mail server allows for access to e-mail without having to be ‘on’ the protected network (e.g., during non-work hours when a user is away from a work computer).
Network 100 may further include various computing devices hosting and executing any variety of connection applications (e.g., connection management application 120). These applications may be distributed across multiple devices, hosted on a single device, or integrated with various other applications at a data store (e.g., data store 110). Connector applications may be built for specific applications, data, data stores, and services.
In the network 100 illustrated in
Connection management application 120 is software installed at the data store 110. Execution of the application 120 by a processing device at this data store 110 provides for notifications to be delivered to e-mail account holders at, for example, a mobile device 150. These notifications may indicate the arrival of new e-mail at the data store 110. In some prior art systems, the connector application 120 may be installed on an enterprise server (e.g., an Exchange Server) or a personal computing device operating in conjunction with data store 110 (e.g., a desktop computer communicatively coupled to an Exchange Server).
Some e-mail account holders may wish to access e-mail at data store 110 through mobile device 150. Mobile device 150 is inclusive of any variety of mobile devices that are capable of communicating over the Internet. Such communication may also include the use of a wireless or landline network. Mobile device 150 is inclusive of cellular telephones, smart phones, personal digital assistants (PDAs), wireless e-mail devices, and handheld computing devices. A variety of mobile networks and communications channels for allowing Internet access are well known in the art.
Notifications, in
E-mail delivery in the prior art network 100 of
Alternatively, a user may access e-mail through the Internet. Optional web access server 160, which may be located on the network DMZ, provides a user with remote access to e-mail stored at data store 110 and behind the firewall 130. One common example of such remote, web-based access is Outlook Web Access (OWA). OWA is a web-mail service found in Microsoft Exchange Server 5.0 and later. OWA provides users with access to e-mail received in the Microsoft Outlook e-mail application via a web browser.
Web access server 160, such as one used to provide OWA, allows for access to e-mail (including support for S/MIME), as well as calendars, contacts, tasks, and other content when the respective desktop application is unavailable. For example, a user may be using a public computing device (e.g., a public computer at an Internet cafe(170)) without the required mail client applications installed (e.g., Microsoft Outlook). If the computing device 170 has Internet access, however, users at device 170 may interface with data store 110 and review electronic mail or other data through a web-page associated with the web access server 160.
Contrary to a pure “push” based e-mail or notification system, web-based access generally requires that the user log in and initiate a web-based session each time the user wishes to view e-mail. To log in, the user provides certain credentials to authenticate user identity (e.g., a user name and password). For security purposes, after a period of inactivity, the session may time out thereby requiring the user to once again provide credentials for the purpose of re-authentication. Such operations may be especially time-consuming for mobile devices, since user interfaces on mobile device are generally much more limited than those on desktop computing devices.
In a first claimed embodiment, a mobile device sends authentication information to a relay server, which executes a connection application to establish a connection to a web access server. Using the established connect, the relay server transmits the authentication information to the web access server associated with a data store hosting a data object. The web access server authenticates the user providing such authentication information. The data object is provided from the data store to the relay server, which provides the data store to the mobile device.
A second claimed embodiment is for a computing device for providing a mobile device with web-based access to data objects. The computing device includes a memory for storing a connection application executable to establish connections with a web access server and a processor for executing the connection application to establish a connection to the web access server associated with a data store hosting the data object. A network interface receives authentication information for the data store, transmits the received authentication information to the web access server via the established connection for subsequent authentication of a user seeking access to the data store. The network interface receives the data object following authentication of the user to the data store by the web access server and transmits the data object to the mobile device.
A third claimed embodiment is for a computer-readable storage media upon which is embodied a program executable to provide a mobile device web-based access to data objects.
Embodiments of the present invention provide a mobile device with access to data objects via the World Wide Web (i.e., web-based access). Authentication information is sent from a mobile device to a relay server. The relay server executes a connection application to establish a connection to a web access server. The authentication information is provided to the web access server associated with a data store hosting a data object. Upon authentication, the data object is provided to the relay server from the data store. The data object is then provided to the mobile device.
Web access server 160 may reside in a separate location from data store 110; as illustrated in
In step 310, authentication information is received. The authentication information may be received from mobile device 150 at relay server 140 or already be stored at relay server 140 if the mobile device 150 has been recognized by the relay server 140. In this latter instance, the authentication information may be retrieved from a database at the relay server 140 in response to some sort of identifying information from the mobile device 150. Credentials may also be providing by another computing device operating in conjunction with relay server 140 such as a provisioning server (not shown). The authentication information (e.g., a user name, password, domain, and/or a token) is associated with accessing data store 110, which stores one or more data objects. A user may enter the authentication information into the mobile device 150, which then sends the information to relay server 140.
In some embodiments, other types of information may also be sent from mobile device 150 to relay server 140. This information may be independent of authentication information (e.g., information not used to authenticate a user). The other information may include profile data or indicate certain types of information to which a user may be allowed access at data store 110. The other information might also include a ‘keep alive’ ping that prevents the relay server 140 from terminating its connection with the mobile device 150. The other information may likewise include instructions for the relay server 140 to generate a ‘keep alive’ ping with the web access server 160 in order to prevent termination of that connection as is further described below.
In step 320, a connection to a web access server 160 is established. Specifically, the connection may be established by a connection application 210 communicatively coupled to the relay server 140. Connection application 210 is executable by a processor of relay server 140 to establish a connection between the relay server 140 and the web access server 160 associated with the data store 110 hosting one or more data objects.
In step 330, the user of mobile device 150 is authenticated. The authentication information received by relay server 140 is sent to web access server 160, which authenticates the user based on the provided authentication information. In some embodiments, if the connection between the relay server 140 and the web access server 160 is terminated, the connection may automatically be re-established whereby the authentication information is automatically re-transmitted to the web access server 160 when the connection is re-established.
In step 340, the data object is received by the relay server 140 from the data store 110. Once the user identity is authenticated by web access server 160 in step 330, relay server 140 is allowed to communicate with data store 110. Specifically, relay server 140 is allowed to access a data object hosted at data store 110. The data object may include e-mail, calendar data, contact data, and other data objects as previously described. Once the relay server 140 receives the data object, the relay server 140 can send the data object to the mobile device 150 in step 350. In some embodiments, the relay server 140 may receive the data object from the data store 110 via the web access server 160.
The connection between the relay server 140 and the web access server 160 may be terminated for various reasons. For example, the connection may time out after a predetermined period of time or based on inactivity. Disconnects may also occurs as a result of equipment or network failures. In some embodiments, the connection may be automatically re-established by connection application 210. Where the connection cannot be re-established immediately, the connection application 210 may periodically poll the web access server 160 to determine whether the connection can be re-established and seek to re-establish the connection when results of polling indicate such a possibility.
Further embodiments may allow a user to register to receive notifications when data store 110 or a data object in data store 110 is updated. These notifications may come from the data store 110 or the web access server 160. A notification may include the actual updated data object. In response to the notification, relay server 140 may determine the status update and provide the update to mobile device 150 or query as to whether the mobile device 150 (or more specifically the user of the mobile device 150) wishes to receive the same.
The terms “computer-readable storage medium” and “computer-readable storage media” as used herein refer to a medium or media that participates in providing instructions to a CPU for execution. Such media can take many forms including, but not limited to, non-volatile and volatile media. Non-volatile media include, for example, optical or magnetic disks, such as a fixed disk. Volatile media include dynamic memory, such as system RAM. Common forms of computer-readable storage media include, for example, a floppy disk, a flexible disk, a hard disk, magnetic tape, any other magnetic medium, a CD-ROM disk, digital video disk (DVD), any other optical medium, punch cards, paper tape, any other physical medium with patterns of marks or holes, a RAM, a PROM, an EPROM, a FLASHEPROM, any other memory chip or cartridge.
Transmission media may include coaxial cables, copper wire and fiber optics and various computer bus. Transmission media can also take the form of acoustic or light waves such as those generated during radio frequency (RF) and infrared (IR) data communications. Carrier wave or other media for transmission of information may be used.
The above description is illustrative and not restrictive. Many variations of the invention will become apparent to those of skill in the art upon review of this disclosure. The scope of the invention should, therefore, be determined not with reference to the above description, but instead should be determined with reference to the appended claims along with their full scope of equivalents.
While the present invention has been described in connection with a series of preferred embodiment, these descriptions are not intended to limit the scope of the invention to the particular forms set forth herein. To the contrary, the present descriptions are intended to cover such alternatives, modifications, and equivalents as may be included within the spirit and scope of the invention as defined by the appended claims and otherwise appreciated by one of ordinary skill in the art.
Patent | Priority | Assignee | Title |
11552918, | Jan 28 2008 | Seven Networks, LLC | System and method of a relay server for managing communications and notification between a mobile device and application server |
11962557, | Jan 28 2008 | Seven Networks, LLC | System and method of a relay server for managing communications and notification between a mobile device and application server |
Patent | Priority | Assignee | Title |
10242104, | Mar 31 2008 | PEEKANALYTICS, INC | Distributed personal information aggregator |
10659417, | Jan 28 2008 | Seven Networks, LLC | System and method of a relay server for managing communications and notification between a mobile device and application server |
5835724, | Jul 03 1996 | GOOGLE LLC | System and method for communication information using the internet that receives and maintains information concerning the client and generates and conveys the session data to the client |
5852775, | Sep 12 1996 | RPX Corporation | Cellular telephone advertising system |
5852820, | Aug 09 1996 | R2 SOLUTIONS LLC | Method for optimizing entries for searching an index |
5867665, | Mar 24 1997 | Cisco Technology, Inc | Domain communications server |
5890147, | Mar 07 1997 | Microsoft Technology Licensing, LLC | Scope testing of documents in a search engine using document to folder mapping |
5898917, | Aug 27 1996 | AG Communication Systems Corporation; AG Communications Systems Corporation | System for providing enhanced services in cellular radio telecommunication systems using #CCSC based triggers |
6065055, | Apr 20 1998 | BLACKBIRD TECH LLC | Inappropriate site management software |
6128627, | Apr 15 1998 | R2 SOLUTIONS LLC | Consistent data storage in an object cache |
6167435, | Oct 30 1998 | VALIDITY, INC | Double opt-in™ method and system for verifying subscriptions to information distribution services |
6336117, | Apr 30 1999 | International Business Machines Corporation | Content-indexing search system and method providing search results consistent with content filtering and blocking policies implemented in a blocking engine |
6363051, | Jun 30 1998 | AT&T Corp. | Method and apparatus for achieving fast reconnection of permanent virtal channels in a frame relay network |
6543695, | Aug 02 1996 | Symbol Technologies, Inc | Housing for hand held scanner |
6556217, | Jun 01 2000 | Nokia Technologies Oy | System and method for content adaptation and pagination based on terminal capabilities |
6636482, | Mar 08 2001 | ARRIS ENTERPRISES LLC | Method and apparatus for controlling traffic loading of different service levels in a cable data system |
6715082, | Jan 14 1999 | Cisco Technology, Inc. | Security server token caching |
6941310, | Jul 17 2002 | Oracle International Corporation | System and method for caching data for a mobile application |
6944447, | Apr 27 2001 | Accenture Global Services Limited | Location-based services |
6968175, | Aug 13 2002 | RPX Corporation | Method and system for sharing transmission revenue between mobile operators and content providers |
6990472, | Oct 23 2000 | Starpound Corporation; STARPOUND CORP | Telecommunications initiated data fulfillment system |
6990497, | Jun 26 2001 | Microsoft Technology Licensing, LLC | Dynamic streaming media management |
6993326, | Apr 02 2001 | KNAPP INVESTMENT COMPANY LIMITED | System and method for providing short message targeted advertisements over a wireless communications network |
7013322, | Jan 28 2000 | SANDPIPER CDN, LLC | System and method for rewriting a media resource request and/or response between origin server and client |
7016909, | Jun 04 2002 | Microsoft Technology Licensing, LLC | Method and system for expansion of recurring calendar events |
7043264, | Dec 18 2002 | Meta Platforms, Inc | Message transmission system in a GPRS environment |
7095715, | Jul 02 2001 | TREND MICRO INCORPORATED | System and method for processing network packet flows |
7117267, | Jun 28 2001 | Oracle America, Inc | System and method for providing tunnel connections between entities in a messaging system |
7157492, | Feb 26 2004 | Wyeth | Dibenzo chromene derivatives and their use as ERβ selective ligands |
7167839, | Nov 05 1999 | Commercial Recovery Corporation | Collection agency data access method |
7177628, | Mar 21 2003 | Google Technology Holdings LLC | Method for enabling IP push capability to wireless devices on a wireless network |
7203733, | Jul 03 1998 | ZHIGU HOLDINGS LIMITED | Method and arrangement for accessing information in a mobile communication network |
7209976, | Jul 16 2002 | Foundry Networks, LLC | Protocol communication and transit packet forwarding routed between multiple virtual routers within a single physical router |
7225259, | Feb 21 2001 | NOKIA INC | Service tunnel over a connectionless network |
7251832, | Mar 13 2003 | Digital Reg of Texas, LLC | Secure streaming container |
7280537, | Aug 07 2003 | Malikie Innovations Limited | Communications system providing adaptive polling based upon positive and negative polling events and related methods |
7324473, | Oct 07 2003 | Accenture Global Services Limited | Connector gateway |
7409423, | Jun 28 2001 | Microsoft Technology Licensing, LLC | Methods for and applications of learning and inferring the periods of time until people are available or unavailable for different forms of communication, collaboration, and information access |
7454457, | Feb 07 2000 | Parallel Networks, LLC | Method and apparatus for dynamic data flow control using prioritization of data requests |
7480707, | May 16 2001 | International Business Machines Corporation | Network communications management system and method |
7532571, | Jun 27 2003 | Microsoft Technology Licensing, LLC | Providing online connectivity across a range of electronic communications systems |
7647561, | Aug 28 2001 | NVIDIA INTERNATIONAL, INC | System, method and computer program product for application development using a visual paradigm to combine existing data and applications |
7650432, | May 20 2004 | Oracle International Corporation | Occasionally-connected application server |
7657277, | Sep 24 2004 | Qualcomm Incorporated | Method and system for power control in a communication system |
7689167, | Jul 22 2005 | Intel Corporation | Methods and apparatus for operating an ensemble of wireless electronic devices based on user activity |
7729366, | Oct 03 2007 | Google Technology Holdings LLC | Method, apparatus and system for network mobility of a mobile communication device |
7748618, | Aug 21 2006 | Verizon Patent and Licensing Inc | Secure near field transaction |
7768920, | Jun 29 2005 | Bandwb Ltd. | Means and methods for dynamically allocating bandwidth |
7809364, | Jul 30 2001 | RPX Corporation | Apparatus, and associated method, for providing an operation parameter to a mobile station of a radio communication station |
7832008, | Oct 11 2006 | Cisco Technology, Inc.; Cisco Technology, Inc | Protection of computer resources |
7873705, | Mar 12 2004 | Flash Networks LTD | System and method for identifying content service within content server |
7921187, | Jun 28 2007 | Apple Inc | Newsreader for mobile device |
7962622, | Aug 07 2001 | Google Technology Holdings LLC | System and method for providing provisioning and upgrade services for a wireless device |
7996673, | May 12 2004 | Echoworx Corporation | System, method and computer product for sending encrypted messages to recipients where the sender does not possess the credentials of the recipient |
8065484, | Jul 19 2007 | Oracle International Corporation | Enhanced access to data available in a cache |
8073565, | Jun 07 2000 | Apple Inc | System and method for alerting a first mobile data processing system nearby a second mobile data processing system |
8151323, | Apr 12 2006 | Citrix Systems, Inc | Systems and methods for providing levels of access and action control via an SSL VPN appliance |
8208946, | Jul 24 2006 | Qualcomm Incorporated | Method, apparatus, and system for transmitting messages |
8275681, | Jun 12 2007 | MEDIA FORUM, INC | Desktop extension for readily-sharable and accessible media playlist and media |
8346605, | Jun 07 2004 | SLING MEDIA L L C | Management of shared media content |
8364181, | Dec 10 2007 | Seven Networks, Inc | Electronic-mail filtering for mobile devices |
8537659, | Dec 20 2006 | Apple Inc | Method and system for reducing service interruptions to mobile communication devices |
8549099, | Jul 12 2007 | Viasat, Inc | Methods and systems for javascript parsing |
8561126, | Dec 29 2004 | International Business Machines Corporation | Automatic enforcement of obligations according to a data-handling policy |
8626136, | Jun 29 2006 | Microsoft Technology Licensing, LLC | Architecture for user- and context-specific prefetching and caching of information on portable devices |
8731542, | Aug 11 2005 | Seven Networks, Inc | Dynamic adjustment of keep-alive message intervals in a mobile network |
8799410, | Jan 28 2008 | SEVEN NETWORKS INC | System and method of a relay server for managing communications and notification between a mobile device and a web access server |
8838744, | Jan 28 2008 | Seven Networks, Inc | Web-based access to data objects |
8868772, | Apr 30 2004 | DISH TECHNOLOGIES LLC | Apparatus, system, and method for adaptive-rate shifting of streaming content |
8938765, | Dec 22 2006 | Time Warner Cable Enterprises LLC | Methods, apparatus and user interface for providing content on demand |
8954515, | Jun 30 2010 | RPX Corporation | Method and apparatus for reducing application update traffic in cellular networks |
8966053, | Jul 12 2007 | Viasat, Inc | Methods and systems for performing a prefetch abort operation for network acceleration |
9009593, | Aug 31 2007 | AT&T Intellectual Property I, LP | Apparatus and method for providing set top box assistance |
9354068, | Jan 14 2008 | Malikie Innovations Limited | System and method for dynamically downloading and displaying map data |
9374406, | Feb 27 2012 | Qualcomm Incorporated | Dash client and receiver with a download rate estimator |
9479604, | Jan 30 2006 | Qualcomm Incorporated | System and method for dynamic phone book and network content links in a mobile device |
9503691, | Feb 19 2008 | Time Warner Cable Enterprises LLC | Methods and apparatus for enhanced advertising and promotional delivery in a network |
20020019812, | |||
20020069308, | |||
20020073212, | |||
20030021400, | |||
20030028441, | |||
20030072451, | |||
20030153338, | |||
20030157947, | |||
20040024892, | |||
20040027326, | |||
20040027378, | |||
20040162890, | |||
20040168052, | |||
20040233930, | |||
20050038707, | |||
20050038724, | |||
20050038863, | |||
20050071674, | |||
20050088989, | |||
20050138198, | |||
20050222891, | |||
20050257057, | |||
20060155811, | |||
20060155822, | |||
20060161621, | |||
20060190569, | |||
20070019610, | |||
20070022118, | |||
20070070931, | |||
20070073874, | |||
20070150881, | |||
20070220080, | |||
20070239557, | |||
20070293207, | |||
20080005348, | |||
20080022336, | |||
20080041937, | |||
20080171556, | |||
20080244415, | |||
20090027222, | |||
20090138614, | |||
20090264100, | |||
20100057924, | |||
20110126250, | |||
20130263016, | |||
AU2003220556, | |||
AU5163701, | |||
CN100386746, | |||
CN100504852, | |||
CN101535992, | |||
CN102239472, | |||
EP822502, | |||
EP1328293, | |||
EP1461717, | |||
EP1992118, | |||
EP2171938, | |||
GB2373067, | |||
GB2377518, | |||
JP2003046576, | |||
JP2003521067, | |||
JP2005044277, | |||
JP3612271, | |||
JP4100997, | |||
JP4345780, | |||
KR100722372, | |||
KR100758281, | |||
KR100769741, | |||
KR20010007743, | |||
KR20050040272, | |||
WO170135, | |||
WO2002087157, | |||
WO2004092982, | |||
WO2005017707, | |||
WO2007058487, | |||
WO2011099365, | |||
WO2011116819, | |||
WO2012024030, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Sep 04 2014 | FIATAL, TREVOR | Seven Networks, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 052688 | /0513 | |
Jul 14 2015 | Seven Networks, Inc | Seven Networks, LLC | ENTITY CONVERSION | 052691 | /0731 | |
May 18 2020 | Seven Networks, LLC | (assignment on the face of the patent) | / |
Date | Maintenance Fee Events |
May 18 2020 | BIG: Entity status set to Undiscounted (note the period is included in the code). |
Date | Maintenance Schedule |
Aug 24 2024 | 4 years fee payment window open |
Feb 24 2025 | 6 months grace period start (w surcharge) |
Aug 24 2025 | patent expiry (for year 4) |
Aug 24 2027 | 2 years to revive unintentionally abandoned end. (for year 4) |
Aug 24 2028 | 8 years fee payment window open |
Feb 24 2029 | 6 months grace period start (w surcharge) |
Aug 24 2029 | patent expiry (for year 8) |
Aug 24 2031 | 2 years to revive unintentionally abandoned end. (for year 8) |
Aug 24 2032 | 12 years fee payment window open |
Feb 24 2033 | 6 months grace period start (w surcharge) |
Aug 24 2033 | patent expiry (for year 12) |
Aug 24 2035 | 2 years to revive unintentionally abandoned end. (for year 12) |